2020 International Wireless Communications and Mobile Computing (IWCMC) 2020
DOI: 10.1109/iwcmc48107.2020.9148502
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Routing Protocol in Heterogeneous Networks for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Satellites manage metadata, allocate data to servers, and conduct regular audits to ensure continuous data storage. In the event of servers failing to store data, replication occurs to maintain redundancy & Jerbi et al, 2020. BlockStore (Ruj et al, 2018) a pioneer in outlining the file storage process, employs Space Wallets-a specialized structure tracking storage space across nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Satellites manage metadata, allocate data to servers, and conduct regular audits to ensure continuous data storage. In the event of servers failing to store data, replication occurs to maintain redundancy & Jerbi et al, 2020. BlockStore (Ruj et al, 2018) a pioneer in outlining the file storage process, employs Space Wallets-a specialized structure tracking storage space across nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the system incorporates regular and automated audits performed by the entire network, facilitated by recoverability proofs (Pourmajidi et al, 2023). This dual approach not only optimizes storage efficiency but also enhances security and accountability within the blockchain ecosystem (Jerbi et al, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…However, the energy will be equal between the different nodes of the zone to oversee, which allows an extension of the life of the network. [19] uses the paralleling technique which makes it possible to accelerate the computation of scalar multiplications. This technique helps to make the work of the CH lightweight.…”
Section: Related Workmentioning
confidence: 99%
“…The protocol saves a lot of computation time with reduced power consumption. [31][32][33][34][35] In the following, we will establish a comprehensive evaluation of our protocol BSI. First, we will perform a threat model to be able to study, analyze, and identify the security needs of IoT systems.…”
Section: Related Workmentioning
confidence: 99%
“…This is because a calculation task is divided into several independent parts, which can be processed at the same time by different member nodes. The protocol saves a lot of computation time with reduced power consumption 31‐35 …”
Section: Related Workmentioning
confidence: 99%